Download presentation
1
Chapter 11: Managing a Secure Network
CCNA Security v2.0
2
Chapter Outline 11.0 Introduction 11.1 Network Security Testing
11.2 Developing a Comprehensive Security Policy 11.3 Summary Chapter Outline
3
Section 11.1: Network Security Testing
Upon completion of this section, you should be able to: Describe the techniques used in network security testing. Describe the tools used in network security testing.
4
Topic 11.1.1: Network Security Testing Techniques
5
Operations Security Operations Security
6
Testing and Evaluating Network Security
7
Types of Network Tests Operational Status of the Network:
Penetration testing Network scanning Vulnerability scanning Password cracking Log review Integrity checks Virus detection Types of Network Tests
8
Applying Network Test Results
9
Topic 11.1.2: Network Security Testing Tools
10
Network Testing Tools Nmap/Zenmap SuperScan SIEM GFI LANguard Tripwire
Nessus L0phtCrack Metasploit Network Testing Tools
11
Nmap and Zenmap Sample Nmap Screenshot Sample Zenmap Screenshot
12
SuperScan SuperScan
13
SIEM Essential functions: Forensic Analysis Correlation Aggregation
Retention SIEM Activity – Identify Network Security Testing Tools
14
Section 11.2: Developing a Comprehensive Security Policy
Upon completion of this section, you should be able to: Explain the purpose of a comprehensive security policy. Describe the structure of a comprehensive security policy. Describe the standards, guidelines, and procedures of a security policy. Explain the roles and responsibilities entailed by a security policy. Explain security awareness and how to achieve through education and training. Explain how to respond to a security breach.
15
Topic 11.2.1: Security Policy Overview
16
Secure Network Life Cycle
Determine what the assets of an organization are by asking: What does the organization have that others want? What processes, data, or information systems are critical to the organization? What would stop the organization from doing business or fulfilling its mission? Secure Network Life Cycle
17
Security Policy Security Policy
18
Security Policy Audience
Audience Determines Security Policy Content Security Policy Audience
19
Topic 11.2.2: Structure of a Security Policy
20
Security Policy Hierarchy
21
Governing Policy A governing policy includes:
Statement of the issue that the policy addresses How the policy applies in the environment Roles and responsibilities of those affected by the policy Actions, activities, and processes that are allowed (and not allowed) Consequences of noncompliance Governing Policy
22
Technical Policies Technical components: General policies
Telephony policy and communication policy Remote access policy Network policy Application policy Technical Policies
23
End User Polices Customize End-User Policies for Groups
Activity – Identify Security Policy Components
24
Topic 11.2.3: Standards, Guidelines, and Procedures
25
Security Policy Documents
26
Standards Documents Standards Documents
27
Guideline Documents NIST Information Technology Portal
28
Guideline Documents (Cont.)
NSA Website Guideline Documents (Cont.)
29
Guideline Documents (Cont.)
Common Criteria Website Guideline Documents (Cont.)
30
Procedure Documents Procedure Documents
31
Topic 11.2.4: Roles and Responsibilities
32
Organizational Reporting Structure
33
Common Executive Titles
Chief Executive Officer (CEO) Chief Technology Officer (CTO) Chief Information Officer (CIO) Chief Security Officer (CSO) Chief Information Security Officer (CISO) Common Executive Titles
34
Topic 11.2.5: Security Awareness and Training
35
Security Awareness Program
Primary components: Awareness campaigns Training and education Security Awareness Program Awareness Campaigns Security Training Course Education Program
36
Topic 11.2.6: Responding to a Security Breach
37
Motive, Opportunity, and Means
38
Collecting Data Collecting Data
39
Section 11.3: Summary Chapter Objectives:
Explain the various techniques and tools used for network security testing. Explain how to develop a comprehensive security policy. Packet Tracer – Skills Integration Challenge Lab – CCNA Security Comprehensive Lab Chapter 11: Managing a Secure Network
41
Instructor Resources Remember, there are helpful tutorials and user guides available via your NetSpace home page. ( These resources cover a variety of topics including navigation, assessments, and assignments. A screenshot has been provided here highlighting the tutorials related to activating exams, managing assessments, and creating quizzes. 1 2
Similar presentations
© 2024 SlidePlayer.com Inc.
All rights reserved.